Hierarchical attribute based encryption with continuous leakage-resilience
From MaRDI portal
Publication:2213099
DOI10.1016/J.INS.2019.01.052zbMath1448.68233OpenAlexW2911261396WikidataQ120855929 ScholiaQ120855929MaRDI QIDQ2213099
Jiguo Li, Qihong Yu, Yi-Chen Zhang
Publication date: 27 November 2020
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2019.01.052
Related Items (10)
Adaptively secure certificate-based broadcast encryption and its application to cloud storage service ⋮ Leakage-resilient identity-based cryptography from minimal assumptions ⋮ An efficient identity-based signature scheme with provable security ⋮ A survey on functional encryption ⋮ Key escrow-free attribute based encryption with user revocation ⋮ Hierarchical and non-monotonic key-policy attribute-based encryption and its application ⋮ (Dual) server-aided revocable attribute-based encryption with decryption key exposure resistance ⋮ Flexible attribute-based proxy re-encryption for efficient data sharing ⋮ Identity-based encryption with leakage-amplified chosen-ciphertext attacks security ⋮ A decentralized multi-authority ciphertext-policy attribute-based encryption with mediated obfuscation
Cites Work
- Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts
- Identity-based broadcast encryption with continuous leakage resilience
- An efficient key-policy attribute-based searchable encryption in prime-order groups
- Provably secure certificate-based encryption with leakage resilience
- Key-policy attribute-based encryption against continual auxiliary input leakage
- Fully leakage-resilient signatures
- Improving timing attack on RSA-CRT via error detection and correction strategy
- Achieving Leakage Resilience through Dual System Encryption
- Unbounded HIBE and Attribute-Based Encryption
- Decentralizing Attribute-Based Encryption
- Leakage Resilient ElGamal Encryption
- Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization
- Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
- Public-Key Encryption Schemes with Auxiliary Inputs
- New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
- Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
- Protecting Cryptographic Keys against Continual Leakage
- Simultaneous Hardcore Bits and Cryptography against Memory Attacks
- Signature Schemes with Bounded Leakage Resilience
- Fuzzy Identity-Based Encryption
- Storing Secrets on Continually Leaky Devices
- Theory of Cryptography
- Public-Key Cryptosystems Resilient to Key Leakage
- Topics in Cryptology – CT-RSA 2006
- Theory of Cryptography
This page was built for publication: Hierarchical attribute based encryption with continuous leakage-resilience